Trend 4 SECURE US TO SECURE ME #TECHVISION2019 Threat actors also exploit ecosystems that were traders created “shopping lists” of companies whose amend their approach, incorporating security into designed to amplify the reach of information, such as press releases the hackers would target and gave the the collaborative strategies they have used to create social networks. And it has been done to great success: hackers a cut of the ill-gotten profits from trading off powerful and innovative products and services. They researchers from MIT found that attackers have been the stolen information.8 must include growing ecosystem dependencies as able to spread fake news faster than real news, with the part of their own security posture and make security top one percent of fake news stories reaching 1,500 And as more of the physical world is controlled by a cardinal component of how they build 7 people six times faster than real stories. digital devices, the risk and potentially dangerous partnerships. Both are a must for security in a post- impact grows. Researchers at Ben Gurion University digital world. But scale is not the only way digital ecosystems are demonstrated that attackers could drain a city’s amplifying cyberattacks. With the business world water tower without a direct attack on its critical Doing so means shifting away from the “my company dependent on ecosystem connections, even the infrastructure—by instead exploiting vulnerable IoT first” mindset and recognizing that today’s emerging smallest disruption to one service can cascade to irrigation systems, forcing them to overdraw from threats demand a cooperative effort. Enterprises will have a massive business impact on other partners. city reserves.9 need to expand the horizons of their risk assessment And while risk management activities are largely and threat modeling to account for a much wider focused on a company’s internal operations, These examples reflect the harsh new reality of threat landscape. They must spread and share attackers are looking at the whole house of cards. business: as companies find rich opportunity in responsibility for security, starting in their own working with whole ecosystems, they are organization—and begin building security For example, for more than five years, a group of simultaneously extending, and absorbing, the risk partnerships that reflect the ecosystems in which hackers stole insider information about publicly and vulnerabilities of those partners as well. Threat they participate. Security in an ecosystem-driven traded companies—not by attacking the companies actors see ecosystems as an ever-widening attack world is no longer about protecting the themselves, but by targeting the newswire agencies surface, while most businesses still look at organization—it is about protecting everyone. that get early access to press releases from the cybersecurity as strictly an individual effort. To world’s largest businesses. Unscrupulous stock respond to this dichotomy, organizations need to 61 TECHNOLOGY VISION 2019 THE POST-DIGITAL ERA IS UPON US

Accenture Technology Vision 2019 | Full Report - Page 66 Accenture Technology Vision 2019 | Full Report Page 65 Page 67